General

  • Target

    f28e51dfd8e27d920fcdc0f13b0c79b14cf6c6a15fd92ee680713d91828bffd5

  • Size

    1.3MB

  • MD5

    14beef9a9605f4863c8b60aed88d7d44

  • SHA1

    67ea38771f3d592c3ef2db779f890535fbf43456

  • SHA256

    f28e51dfd8e27d920fcdc0f13b0c79b14cf6c6a15fd92ee680713d91828bffd5

  • SHA512

    574345eaa037a1f8908104d4041df93aac647fe658c37a68396c366baa8b1f243faa15573392df355ca7a3c34128c3d0109eddc2e7574095496b8ff2cbd0bdb2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • f28e51dfd8e27d920fcdc0f13b0c79b14cf6c6a15fd92ee680713d91828bffd5
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections